mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-06 02:31:38 +00:00
2.1 KiB
2.1 KiB
CVE-2023-32233
Description
In the Linux kernel through 6.3.1, a use-after-free in Netfilter nf_tables when processing batch requests can be abused to perform arbitrary read and write operations on kernel memory. Unprivileged local users can obtain root privileges. This occurs because anonymous sets are mishandled.
POC
Reference
- http://packetstormsecurity.com/files/173087/Kernel-Live-Patch-Security-Notice-LSN-0095-1.html
- https://news.ycombinator.com/item?id=35879660
Github
- https://github.com/0xMarcio/cve
- https://github.com/0xsyr0/OSCP
- https://github.com/ARGOeu-Metrics/secmon-probes
- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/CVEDB/top
- https://github.com/EGI-Federation/SVG-advisories
- https://github.com/GhostTroops/TOP
- https://github.com/Liuk3r/CVE-2023-32233
- https://github.com/Mr-xn/Penetration_Testing_POC
- https://github.com/PIDAN-HEIDASHUAI/CVE-2023-32233
- https://github.com/RogelioPumajulca/TEST-CVE-2023-32233
- https://github.com/SenukDias/OSCP_cheat
- https://github.com/SirElmard/ethical_hacking
- https://github.com/Threekiii/CVE
- https://github.com/djki5s/tools
- https://github.com/hktalent/TOP
- https://github.com/johe123qwe/github-trending
- https://github.com/kgwanjala/oscp-cheatsheet
- https://github.com/lions2012/Penetration_Testing_POC
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/oferchen/POC-CVE-2023-32233
- https://github.com/oscpname/OSCP_cheat
- https://github.com/revanmalang/OSCP
- https://github.com/sirhc505/CVE_TOOLS
- https://github.com/tanjiti/sec_profile
- https://github.com/txuswashere/OSCP
- https://github.com/void0red/CVE-2023-32233
- https://github.com/xairy/linux-kernel-exploitation
- https://github.com/xhref/OSCP
- https://github.com/xyxj1024/xyxj1024.github.io